Skip to content

Latest commit

 

History

History

fprot

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

malice-fprot

License Docker Stars Docker Pulls

This repository contains a Dockerfile of fprot for Docker's trusted build published to the public DockerHub.

Dependencies

Installation

  1. Install Docker.
  2. Download trusted build from public DockerHub: docker pull malice/fprot

Usage

docker run --rm malice/fprot EICAR

Or link your own malware folder:

$ docker run --rm -v /path/to/malware:/malware:ro malice/fprot FILE

Usage: fprot [OPTIONS] COMMAND [arg...]

Malice F-PROT AntiVirus Plugin

Version: v0.1.0, BuildTime: 20160214

Author:
  blacktop - <https://github.com/blacktop>

Options:
  --verbose, -V         verbose output
  --table, -t           output as Markdown table
  --post, -p            POST results to Malice webhook [$MALICE_ENDPOINT]
  --proxy, -x           proxy settings for Malice webhook endpoint [$MALICE_PROXY]
  --elasitcsearch value elasitcsearch address for Malice to store results [$MALICE_ELASTICSEARCH] 
  --help, -h            show help
  --version, -v         print the version

Commands:
  update        Update virus definitions
  help          Shows a list of commands or help for one command

Run 'fprot COMMAND --help' for more information on a command.

This will output to stdout and POST to malice results API webhook endpoint.

Sample Output JSON:

{
  "f-prot": {
    "infected": true,
    "result": "EICAR_Test_File (exact)",
    "engine": "4.6.5.141",
    "updated": "20160213"
  }
}

Sample Output STDOUT (Markdown Table):


F-PROT

Infected Result Engine Updated
true EICAR_Test_File (exact) 4.6.5.141 20160213

To write results to ElasticSearch

$ docker volume create --name malice
$ docker run -d -p 9200:9200 -v malice:/data --name elastic elasticsearch
$ docker run --rm -v /path/to/malware:/malware:ro --link elastic malice/fprot -t FILE

Documentation

To update the AV run the following:

$ docker run --name=fprot malice/fprot update

Then to use the updated F-PROT container:

$ docker commit fprot malice/fprot:updated
$ docker rm fprot # clean up updated container
$ docker run --rm malice/fprot:updated EICAR

Issues

Find a bug? Want more features? Find something missing in the documentation? Let me know! Please don't hesitate to file an issue and I'll get right on it.

License

MIT Copyright (c) 2016 blacktop